CONTACT
Menu
Support
Contact

The Springboard / two-step verification

by Elaine Evans, on Apr 27, 2020 5:38:02 PM

The Center for Internet Security recently released a guide for Cybersecurity during the COVID-19 Pandemic. Not surprisingly, it hones in on securing environments outside of the company firewall. There's a …

Read Story
Topics:Network ManagementTech TipsEndpoint ProtectionBusiness TipsDevice ManagementRansomwareData BackupIT project managementtwo-step verificationBYODBest Practices

by Elaine Evans, on Jan 14, 2020 4:57:40 PM

You may have heard of the California Consumer Privacy Act and know that it is bringing more stringent data protection laws than we’ve seen yet. And, while its name leads …

Read Story
Topics:InsiderNetwork ManagementTech TipsEndpoint ProtectionBusiness TipsDevice ManagementRansomwareManaged servicestwo-step verificationransomware attackCo-Managed ServicesBest Practices

by Duncan McNabb, on Feb 14, 2019 11:22:26 AM

It seems that we can't go a week without hearing about some new security breach involving tens of thousands or even millions of passwords, which is even more worrisome with …

Read Story
Topics:two-step verification

A Blog for Businesses That Use Apple

Our blog is dedicated to educating our clients and potential clients about all things Apple IT-related but in real-world capacity. So, we talk about Mac management, but we also talk about ways to teach your employees about phishing. We highlight topics surrounding our Best Practices for Managing Apple IT in Business.  Learn More  >

Get Apple IT tips for your business straight to your inbox (do it!)